Note: The following exercises are provided to allow independent, unguided work using the skills you Now that you have mastered creating the firewall rules for the TargetWindows02 web server, you are the Acme Technical Institute firewall expert. A database administrator just approached you and mentioned that she is having difficulty accessing the TargetSQL01 database server from her virtual workstation.
The database server's IP address is 172.30.0.17 and the administrator believes that she should be able to access the SQL Server database using these SQL Server authentication credentials:
• Username: bross
• Password: Stars&Stripes4ever

Part 1: Research Firewall Rule Requirements
Before you create a firewall rule, you should understand the protocols and ports involved in the connection. Researching firewall rule requirements is a common task for security professionals.
Using the Internet, research and identify the protocol and port necessary for a Microsoft SQL Se database connection.